Browsing by Title
Now showing items 241-260 of 1180
-
Curriculum Content Relevancy in Integration of ICTs in Kenya TVET Institutions in Readiness to Industry Needs
(International Journal of Secondary Education, 2017)The development of curricula content and their implementation is one of the key competences of instructors in the area of educational planning and practical training for Technical and Vocational Education and Training ... -
Customers’ perceptions and expectations of service quality in hotels in western tourism circuit, Kenya
(International Research Journals, 2014-01)Quality management is important in any establishment since it enhances organization’s performance and profitability in the long run. Subsequently, quality has been a focus of many successful establishments all over the ... -
Customers’ perceptions and expectations of service quality in hotels in western tourism circuit, Kenya
(International Research Journals, 2014-01)Quality management is important in any establishment since it enhances organization’s performance and profitability in the long run. Subsequently, quality has been a focus of many successful establishments all over the ... -
Cyber Bulling Among Learners in Higher Educational Institutions in Sub-Saharan Africa: Examining Challenges and Possible Mitigations
(Canadian Center of Science and Education, 2020-03)Proliferation of technology in the form of internet, mobile phone and social media access and usage is exposing many youths to cyber bullying activities. Cyber bullying activities are viewed as negative consequences of ... -
Cyclooxygenase inhibitory compounds from Gymnosporia heterophylla aerial parts
(Elsevier, 2017)Gymnosporia heterophylla (Celastraceae) is an African medicinal plants used to treat painful and inflammatory diseases with partial scientific validation. Solvent extractions followed by repeated chromatographic purification ... -
Data Mining Model for Predicting Student Enrolment in STEM Courses in Higher Education Institutions
(2016-11-11)Educational data mining is the process of applying data mining tools and techniques to analyze data at educational institutions. In this paper, educational data mining was used to predict enrollment of students in Science, ... -
Data Preparation for Machine Learning Modelling
(2022)The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ... -
Deepening Market Integration In Kenya through Increased maize production
(2021-06)Market integration promotes effective market reform in developing countries. Where there is a of market integration, markets are competitive and there is no justification for costly government interventions designed to ... -
The dependency of bus voltage and frequency in load shedding
(2013)Load shedding schemes proposed in literature so far use voltage and frequency parameters separately. The individual consideration of these indices may not be reliable or effective, and may even lead to the over load shedding ... -
Desert Margins Program In Kenya: Integrated Socio-Economics Analysis Of Benchmark Sites
(2004)This paper presents socio-economic analysis of the Desert Margins Programme (DMP) benchmark sites in Kajiado and Makueni Districts in Southern rangelands, Marsabit District (Kalacha, Kargi, Korr and Ngurunit) and Turkana ... -
The Desert Margins Programme Approaches in Upscaling Best-Bet Technologies in Arid and Semi-arid Lands in Kenya
(2011)Kenya’s land surface is primarily arid and AQ1 semi-aridlands(ASALs)whichaccountfor84%ofthe totallandarea.TheDesertMarginsProgramme(DMP) inKenyahasmadesomecontributiontounderstanding which technology options have potential ... -
Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol
(Scientific & Academic Publishing, 2020-05)Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ... -
Design and Synthesis of Organic Molecular Models of Artificial Photosynthetic Reaction Center
(2016)A clean and sustainable alternative to fossil fuels is solar energy. For efficient use of solar energy to be realized, artificial systems that can effectively capture and convert sunlight into a usable form of energy ... -
Design optimization of a renewable hybrid energy system
(2013)This paper proposes the optimal design of a renewable hybrid energy system consisting of solar, wind energy with battery storage suitable for application in remote areas. The study investigates the possibility of reducing ... -
Designing and Development of Speech Database The Technical Review
(2011-01)The speech database is one of the crucial items used for the automatic speech recognition system (ASR System). The paper reviews numerous techniques to design and development speech databases for different purpose. The ... -
Designing of new proposed technique for lie Detection using EEG Signals
(2011-03)The proposed system is designed to make EEG database of criminals during the investigation by crime branch. System will be detecting the criminals on the bases of thought related to crime to be stored in brain, when the ... -
Detection of sweet potato viruses in Western Kenya, development of a multiplex PCR technique for simultaneous detection of major viruses and evaluation of medicinal plants for antifungal and antibacterial activities against the crop pathogens
(2011)Sweet potato is an important food crop worldwide since it is drought tolerant and acts as a famine relief crop. However, its production is limited by viral, fungal and bacterial infections. Lack of rapid and sensitive ... -
Detection of Visual Similarity Snooping Attacks in Emails using an Extended Client Based Technique
(2021-04)This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier that attain in-depth defense by performing textual analysis on email messages and attachment ...